SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
Introduction
        Walking down the layers
               Into kernelspace
                      That's it!



           Wireless Kernel Tweaking
        or how B.A.T.M.A.N. learned to y




         Marek Lindner, Simon Wunderlich




                    December 28, 2007




Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction
                     Walking down the layers
                            Into kernelspace
                                   That's it!

Outline


  1   Introduction
        what is a (dynamic) routing protocol?
        the B.A.T.M.A.N. approach

  2   Walking down the layers
        layer 3 vs. layer 2
        implementation issues
        bridging

  3   Into kernelspace
        what's dierent
        interacting with the kernel

  4   That's it!



             Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction
                  Walking down the layers    what is a (dynamic) routing protocol?
                         Into kernelspace    the B.A.T.M.A.N. approach
                                That's it!

Example scenario - 6:00




          Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction
                  Walking down the layers    what is a (dynamic) routing protocol?
                         Into kernelspace    the B.A.T.M.A.N. approach
                                That's it!

Example scenario - 23:00




          Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction
                 Walking down the layers    what is a (dynamic) routing protocol?
                        Into kernelspace    the B.A.T.M.A.N. approach
                               That's it!

Example scenario (2)




         Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction
                   Walking down the layers    what is a (dynamic) routing protocol?
                          Into kernelspace    the B.A.T.M.A.N. approach
                                 That's it!

Introduction to B.A.T.M.A.N.




      B.A.T.M.A.N. = better approach to mobile adhoc networks

      only decide next neighbour, not whole route

      topology is not used or known by nodes

      routing decisions are distributed by the nodes

      designed for lossy networks

      routing protocols internal is out of scope, we just assume it
      works ;)




           Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction    layer 3 vs. layer 2
                  Walking down the layers    implementation issues
                         Into kernelspace    bridging
                                That's it!

Layer 3 - isn't that enough?




      B.A.T.M.A.N. alters routing tables

      kernel manages routing of payload trac

      this works only for IP, no IPv6, DHCP, IPX ...

      users have to make sure that everyone has an unique IP

      routing into/outside other networks is quite complex

          Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction    layer 3 vs. layer 2
                    Walking down the layers    implementation issues
                           Into kernelspace    bridging
                                  That's it!

Let's try layer 2




       write userspace proof-of-concept, then go to kernelspace

       instead of IPs, use MAC-addresses as identiers (should
       be[TM] unique per design)

       we provide a virtual switch-port bat0 to the user

       virtual Ethernet interface (TAP), all other nodes are just one
       (virtual) hop away

       IP, IPv6, DHCP, IPX already works on Ethernet, we have
       nothing to do

       can be used as bridge over multiple interfaces (e.g. WiFi and
       Ethernet)




            Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction            layer 3 vs. layer 2
                           Walking down the layers            implementation issues
                                  Into kernelspace            bridging
                                         That's it!

Usage




        provide a virtual switch-port bat0 to the user
        k e r o :/# i f c o n f i g bat0
        bat0            L i n k encap : E t h e r n e t HWaddr 0 0 : 1 3 : 3 7 : 9 1 : 4 2 : 3 7
                         i n e t 6 addr : f e 8 0 : : 2 1 7 : 1 3 f f : f e 3 7 :4237/64 Scope : L i n k
                        UP BROADCAST RUNNING MULTICAST MTU: 1 4 7 2 M e t r i c : 1
                        RX p a c k e t s : 0 e r r o r s : 0 dropped : 0 o v e r r u n s : 0 frame : 0
                        TX p a c k e t s : 4 e r r o r s : 0 dropped : 0 o v e r r u n s : 0 c a r r i e r : 0
                         c o l l i s i o n s :0 txqueuelen :500
                        RX b y t e s : 0 ( 0 . 0 B) TX b y t e s : 3 2 8 ( 3 2 8 . 0 B)

        participants set IP adresses (etc.) on their bat0 interface

        k e r o :/# i f c o n f i g bat0 i n e t 1 9 2 . 1 6 8 . 1 0 . 2 3
        k e r o :/# r o u t e add d e f a u l t gw 1 9 2 . 1 6 8 . 1 0 . 2 3
        ( o r even b e t t e r : )
        k e r o :/# d h c l i e n t bat0




                Marek Lindner, Simon Wunderlich               Wireless Kernel Tweaking
Introduction    layer 3 vs. layer 2
                   Walking down the layers    implementation issues
                          Into kernelspace    bridging
                                 That's it!

All the layer 2 belong to us!




      B.A.T.M.A.N. transports the Ethernet-Frame to the node with
      the destination MAC

      it does not care about IP-adresses etc, just as your switch

      OGMs and payload are encapsulated in our own
      Ethernet-Frames (Ethertype 0x0842)


           Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction    layer 3 vs. layer 2
                    Walking down the layers    implementation issues
                           Into kernelspace    bridging
                                  That's it!

Implementation




     TAP-interface bat0 receives/sends Ethernet-Frames from the
     user
     we decide which neighbour should receive it, based on the
     B.A.T.M.A.N. algorithm
            Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction    layer 3 vs. layer 2
                  Walking down the layers    implementation issues
                         Into kernelspace    bridging
                                That's it!

Bridging support




      B.A.T.M.A.N. collects MACs of participants behind the Bridge
      These lists are announced via HNA-Messages and ooded to
      all B.A.T.M.A.N. nodes
      With this, we have a decentralized MAC Translation Table
          Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction    layer 3 vs. layer 2
                  Walking down the layers    implementation issues
                         Into kernelspace    bridging
                                That's it!

Visualization




      Nice side eect: with the HNA information, the whole
      topology with the nodes behind the APs becomes visible
          Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction    layer 3 vs. layer 2
                    Walking down the layers    implementation issues
                           Into kernelspace    bridging
                                  That's it!

Great - and now?


     proof-of-concept implementation in the userspace works quite
     well

     the problem is: performance!

     it should also run well on minimal embedded systems (Access
     Points, Cell Phones)
     typical path is:
            select(): wait for a packet
            read() it
            nd next hop, update tables etc. (pretty fast)
            write() it
     System Calls for read/write take very long time (switch to
     kernel mode and back, copy overhead)

     becomes a problem with high bandwidth usage, peak
     performance of the NICs can't be reached

            Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction
                  Walking down the layers    what's dierent
                         Into kernelspace    interacting with the kernel
                                That's it!

Put it into kernelspace




      No useless message copy (recycle kernel buers)

      no Syscalls and no user/kernel mode switch

      kernel works asynchronous and preemptive

      asynchronous packet handling possible




          Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction
                         Walking down the layers        what's dierent
                                Into kernelspace        interacting with the kernel
                                       That's it!

Living in the kernelspace




      the proc lesystem
      # l s / p r o c / n e t /batman−adv /
      gateways
      interfaces
      log
      log_level
      originators
      orig_interval

      activating batman-adv
      #   echo wlan0  / p r o c / n e t /batman−adv / i n t e r f a c e s

      deactivating batman-adv
      #   echo quot;quot;  / p r o c / n e t /batman−adv / i n t e r f a c e s




              Marek Lindner, Simon Wunderlich           Wireless Kernel Tweaking
Introduction
                         Walking down the layers            what's dierent
                                Into kernelspace            interacting with the kernel
                                       That's it!

Logging merits special attention


      the log level
      #   c a t / p r o c / n e t /batman−adv / l o g _ l e v e l
      [ x ] c r i t i c a l (0)
      [ ] warnings (1)
      [ ] notices (2)
      [ ] batman ( 4 )
      [ ] routes (8)

      setting the log level
      #   echo 3  / p r o c / n e t /batman−adv / l o g _ l e v e l
      #   c a t / p r o c / n e t /batman−adv / l o g _ l e v e l
      [ x ] c r i t i c a l (0)
      [ x ] warnings (1)
      [ x ] notices (2)
      [ ] batman ( 4 )
      [ ] routes (8)

      reading the log
      #   c a t / p r o c / n e t /batman−adv / l o g
      [             6 2 6 ] B . A .T.M. A .N. Advanced 0.1− a l p h a ( c o m p a b i l i t y v e r s i o n 1)
      [             9 7 1 ] Changing l o g _ l e v e l from : 0 to : 3

              Marek Lindner, Simon Wunderlich               Wireless Kernel Tweaking
Introduction
                  Walking down the layers    what's dierent
                         Into kernelspace    interacting with the kernel
                                That's it!

Kernel development




     don't be scared

     the kernel is a big library for all your hacking needs

     debugging techniques:
          clean programming - think before you insmod
          printk - tells you what's up
          kernel oops - gives you the stack trace
          UML - safer debugging
     again: don't panic! :-)




          Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction
                   Walking down the layers    what's dierent
                          Into kernelspace    interacting with the kernel
                                 That's it!

Battool




      there is no ICMP on Layer 2

      we still want to ping, traceroute etc to debug the network

      implement own ICMP protocol into batman-adv protocol

      battool provides ping, traceroute and raw packet dump

      injects and receives special packets into unix socket
      (userspace) or device (kernelspace)




           Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction
                    Walking down the layers
                           Into kernelspace
                                  That's it!

Links




        http://open-mesh.net/

        https://dev.open-mesh.net/batman




            Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction
                 Walking down the layers
                        Into kernelspace
                               That's it!

Thank you!




         Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking

Contenu connexe

Tendances

CloudStackユーザ会〜仮想ルータの謎に迫る
CloudStackユーザ会〜仮想ルータの謎に迫るCloudStackユーザ会〜仮想ルータの謎に迫る
CloudStackユーザ会〜仮想ルータの謎に迫るsamemoon
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...eSAT Journals
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...eSAT Publishing House
 
Stefano Giordano
Stefano GiordanoStefano Giordano
Stefano GiordanoGoWireless
 
How Quantum configures Virtual Networks under the Hood?
How Quantum configures Virtual Networks under the Hood?How Quantum configures Virtual Networks under the Hood?
How Quantum configures Virtual Networks under the Hood?Etsuji Nakai
 
AN EVALUATION ON SELFISH BEHAVIOUR ATTACK AND JELLYFISH ATTACKS UNDER AODV RO...
AN EVALUATION ON SELFISH BEHAVIOUR ATTACK AND JELLYFISH ATTACKS UNDER AODV RO...AN EVALUATION ON SELFISH BEHAVIOUR ATTACK AND JELLYFISH ATTACKS UNDER AODV RO...
AN EVALUATION ON SELFISH BEHAVIOUR ATTACK AND JELLYFISH ATTACKS UNDER AODV RO...ijfcstjournal
 
BonFIRE TridentCom presentation
BonFIRE TridentCom presentationBonFIRE TridentCom presentation
BonFIRE TridentCom presentationBonFIRE
 
Security Support in In-Network Processing & analysis of key management in WSN
Security Support in In-Network  Processing & analysis of key management in  WSNSecurity Support in In-Network  Processing & analysis of key management in  WSN
Security Support in In-Network Processing & analysis of key management in WSNvik001ind
 
Networking With Windows Server 2003 Part 2 By Yapa Wijeratne
Networking With Windows Server 2003 Part 2 By Yapa WijeratneNetworking With Windows Server 2003 Part 2 By Yapa Wijeratne
Networking With Windows Server 2003 Part 2 By Yapa WijeratneYapa
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
 
Secure Scan Design Using Redundant Scan Register
Secure Scan Design Using Redundant Scan RegisterSecure Scan Design Using Redundant Scan Register
Secure Scan Design Using Redundant Scan RegisterIDES Editor
 
Pcb carolina scg_2010
Pcb carolina scg_2010Pcb carolina scg_2010
Pcb carolina scg_2010tcoyle72
 
Multihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksMultihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksChuka Okoye
 

Tendances (18)

OpenStack SDN
OpenStack SDNOpenStack SDN
OpenStack SDN
 
An03 dws
An03 dwsAn03 dws
An03 dws
 
CloudStackユーザ会〜仮想ルータの謎に迫る
CloudStackユーザ会〜仮想ルータの謎に迫るCloudStackユーザ会〜仮想ルータの謎に迫る
CloudStackユーザ会〜仮想ルータの謎に迫る
 
Ic0906 wi-uav UAVNet
Ic0906 wi-uav UAVNetIc0906 wi-uav UAVNet
Ic0906 wi-uav UAVNet
 
Iq2415181523
Iq2415181523Iq2415181523
Iq2415181523
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...
 
Presentation 3
Presentation 3Presentation 3
Presentation 3
 
Stefano Giordano
Stefano GiordanoStefano Giordano
Stefano Giordano
 
How Quantum configures Virtual Networks under the Hood?
How Quantum configures Virtual Networks under the Hood?How Quantum configures Virtual Networks under the Hood?
How Quantum configures Virtual Networks under the Hood?
 
AN EVALUATION ON SELFISH BEHAVIOUR ATTACK AND JELLYFISH ATTACKS UNDER AODV RO...
AN EVALUATION ON SELFISH BEHAVIOUR ATTACK AND JELLYFISH ATTACKS UNDER AODV RO...AN EVALUATION ON SELFISH BEHAVIOUR ATTACK AND JELLYFISH ATTACKS UNDER AODV RO...
AN EVALUATION ON SELFISH BEHAVIOUR ATTACK AND JELLYFISH ATTACKS UNDER AODV RO...
 
BonFIRE TridentCom presentation
BonFIRE TridentCom presentationBonFIRE TridentCom presentation
BonFIRE TridentCom presentation
 
Security Support in In-Network Processing & analysis of key management in WSN
Security Support in In-Network  Processing & analysis of key management in  WSNSecurity Support in In-Network  Processing & analysis of key management in  WSN
Security Support in In-Network Processing & analysis of key management in WSN
 
Networking With Windows Server 2003 Part 2 By Yapa Wijeratne
Networking With Windows Server 2003 Part 2 By Yapa WijeratneNetworking With Windows Server 2003 Part 2 By Yapa Wijeratne
Networking With Windows Server 2003 Part 2 By Yapa Wijeratne
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
Secure Scan Design Using Redundant Scan Register
Secure Scan Design Using Redundant Scan RegisterSecure Scan Design Using Redundant Scan Register
Secure Scan Design Using Redundant Scan Register
 
Pcb carolina scg_2010
Pcb carolina scg_2010Pcb carolina scg_2010
Pcb carolina scg_2010
 
Multihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksMultihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor Networks
 

Similaire à Wireless Hacking Talk

Fairness of the WiMAX System
Fairness of the WiMAX SystemFairness of the WiMAX System
Fairness of the WiMAX SystemGiacomo Verticale
 
Router vs switch
Router vs switchRouter vs switch
Router vs switchIT Tech
 
Important terms in understanding internet programming
Important terms in understanding internet programmingImportant terms in understanding internet programming
Important terms in understanding internet programmingshahajahankhan123
 
WSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.pptWSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.pptAbyThomas54
 
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...PROIDEA
 
Mcse notes
Mcse notesMcse notes
Mcse notesvrammn
 
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722Prince Mishra
 
Net consultantsch2
Net consultantsch2Net consultantsch2
Net consultantsch2citdel
 
CCNA(R&S) By Ezxprt
CCNA(R&S) By EzxprtCCNA(R&S) By Ezxprt
CCNA(R&S) By EzxprtEzxprt
 
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-NetzwerkstackL2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-NetzwerkstackMaximilan Wilhelm
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...IJCNCJournal
 

Similaire à Wireless Hacking Talk (20)

Fairness of the WiMAX System
Fairness of the WiMAX SystemFairness of the WiMAX System
Fairness of the WiMAX System
 
Router vs switch
Router vs switchRouter vs switch
Router vs switch
 
Important terms in understanding internet programming
Important terms in understanding internet programmingImportant terms in understanding internet programming
Important terms in understanding internet programming
 
WSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.pptWSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.ppt
 
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
 
VLAN ON PACKET TRACER
VLAN ON PACKET TRACERVLAN ON PACKET TRACER
VLAN ON PACKET TRACER
 
VLAN on packet Tracer
VLAN on packet TracerVLAN on packet Tracer
VLAN on packet Tracer
 
VLAN ON PACKET TRACER
VLAN ON PACKET TRACERVLAN ON PACKET TRACER
VLAN ON PACKET TRACER
 
Mcse notes
Mcse notesMcse notes
Mcse notes
 
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
 
Majorppt
MajorpptMajorppt
Majorppt
 
lan overview
lan overviewlan overview
lan overview
 
Mini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANsMini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANs
 
Telecommunications Concentration
Telecommunications ConcentrationTelecommunications Concentration
Telecommunications Concentration
 
Net consultantsch2
Net consultantsch2Net consultantsch2
Net consultantsch2
 
Userspace networking
Userspace networkingUserspace networking
Userspace networking
 
CCNA(R&S) By Ezxprt
CCNA(R&S) By EzxprtCCNA(R&S) By Ezxprt
CCNA(R&S) By Ezxprt
 
Ccna (200 125)
Ccna (200 125)Ccna (200 125)
Ccna (200 125)
 
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-NetzwerkstackL2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 für Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...
 

Plus de Mario B.

Lubuntu at FOSSASIA 2011
Lubuntu at FOSSASIA 2011Lubuntu at FOSSASIA 2011
Lubuntu at FOSSASIA 2011Mario B.
 
Creative Commons in Vietnam - Presentation by Mario Behling and Hong Phuc Dan...
Creative Commons in Vietnam - Presentation by Mario Behling and Hong Phuc Dan...Creative Commons in Vietnam - Presentation by Mario Behling and Hong Phuc Dan...
Creative Commons in Vietnam - Presentation by Mario Behling and Hong Phuc Dan...Mario B.
 
OLPC Vietnam - Pilot Project Vung Vieng Fishing Village
OLPC Vietnam - Pilot Project Vung Vieng Fishing VillageOLPC Vietnam - Pilot Project Vung Vieng Fishing Village
OLPC Vietnam - Pilot Project Vung Vieng Fishing VillageMario B.
 
Pockey Lam - Women In It
Pockey Lam - Women In ItPockey Lam - Women In It
Pockey Lam - Women In ItMario B.
 
Rao Yeleswarapu - Moblin Overview Apac Roadshow 2009 For Gnome
Rao Yeleswarapu - Moblin Overview Apac Roadshow 2009 For GnomeRao Yeleswarapu - Moblin Overview Apac Roadshow 2009 For Gnome
Rao Yeleswarapu - Moblin Overview Apac Roadshow 2009 For GnomeMario B.
 
Tran Van Tuan - Gnome Asia Talk 20 11 2009
Tran Van Tuan - Gnome Asia Talk 20 11 2009Tran Van Tuan - Gnome Asia Talk 20 11 2009
Tran Van Tuan - Gnome Asia Talk 20 11 2009Mario B.
 
Ray Wang - Gnome Accessibility And Automation Testing
Ray Wang - Gnome Accessibility And  Automation TestingRay Wang - Gnome Accessibility And  Automation Testing
Ray Wang - Gnome Accessibility And Automation TestingMario B.
 
Louis Suarez Potts - Community Matters Copu2009
Louis Suarez Potts - Community Matters Copu2009Louis Suarez Potts - Community Matters Copu2009
Louis Suarez Potts - Community Matters Copu2009Mario B.
 
Frank Schellenberg - Ghp Far Ease Gnome Asia 2009
Frank Schellenberg - Ghp Far Ease  Gnome Asia 2009Frank Schellenberg - Ghp Far Ease  Gnome Asia 2009
Frank Schellenberg - Ghp Far Ease Gnome Asia 2009Mario B.
 
Huu Le - Tma Open Source For Project Tools
Huu Le - Tma Open Source For Project ToolsHuu Le - Tma Open Source For Project Tools
Huu Le - Tma Open Source For Project ToolsMario B.
 
Nguyen Vu Hung - Gnome Asia 2009 The Vision Of O Oo In Vietnam
Nguyen Vu Hung - Gnome Asia 2009 The Vision Of O Oo In VietnamNguyen Vu Hung - Gnome Asia 2009 The Vision Of O Oo In Vietnam
Nguyen Vu Hung - Gnome Asia 2009 The Vision Of O Oo In VietnamMario B.
 
Fred Muller - Building Amips Netbook
Fred Muller - Building Amips NetbookFred Muller - Building Amips Netbook
Fred Muller - Building Amips NetbookMario B.
 
Mario Behling - Easier Faster Energy Saving
Mario Behling - Easier Faster Energy SavingMario Behling - Easier Faster Energy Saving
Mario Behling - Easier Faster Energy SavingMario B.
 
GNOME.Asia 2009 Vietnam
GNOME.Asia 2009 VietnamGNOME.Asia 2009 Vietnam
GNOME.Asia 2009 VietnamMario B.
 
DebConf11 Berlin Proposal
DebConf11 Berlin ProposalDebConf11 Berlin Proposal
DebConf11 Berlin ProposalMario B.
 
Debconf 11 in Germany
Debconf 11 in GermanyDebconf 11 in Germany
Debconf 11 in GermanyMario B.
 
LXDE Google Summer of Code 2009
LXDE Google Summer of Code 2009LXDE Google Summer of Code 2009
LXDE Google Summer of Code 2009Mario B.
 
6mesh - IPv6 freifunk mesh networks
6mesh - IPv6 freifunk mesh networks6mesh - IPv6 freifunk mesh networks
6mesh - IPv6 freifunk mesh networksMario B.
 
LXDE Presentation at FOSDEM 2009
LXDE Presentation at FOSDEM 2009LXDE Presentation at FOSDEM 2009
LXDE Presentation at FOSDEM 2009Mario B.
 
LXDE Icos2008 Presentation
LXDE Icos2008 PresentationLXDE Icos2008 Presentation
LXDE Icos2008 PresentationMario B.
 

Plus de Mario B. (20)

Lubuntu at FOSSASIA 2011
Lubuntu at FOSSASIA 2011Lubuntu at FOSSASIA 2011
Lubuntu at FOSSASIA 2011
 
Creative Commons in Vietnam - Presentation by Mario Behling and Hong Phuc Dan...
Creative Commons in Vietnam - Presentation by Mario Behling and Hong Phuc Dan...Creative Commons in Vietnam - Presentation by Mario Behling and Hong Phuc Dan...
Creative Commons in Vietnam - Presentation by Mario Behling and Hong Phuc Dan...
 
OLPC Vietnam - Pilot Project Vung Vieng Fishing Village
OLPC Vietnam - Pilot Project Vung Vieng Fishing VillageOLPC Vietnam - Pilot Project Vung Vieng Fishing Village
OLPC Vietnam - Pilot Project Vung Vieng Fishing Village
 
Pockey Lam - Women In It
Pockey Lam - Women In ItPockey Lam - Women In It
Pockey Lam - Women In It
 
Rao Yeleswarapu - Moblin Overview Apac Roadshow 2009 For Gnome
Rao Yeleswarapu - Moblin Overview Apac Roadshow 2009 For GnomeRao Yeleswarapu - Moblin Overview Apac Roadshow 2009 For Gnome
Rao Yeleswarapu - Moblin Overview Apac Roadshow 2009 For Gnome
 
Tran Van Tuan - Gnome Asia Talk 20 11 2009
Tran Van Tuan - Gnome Asia Talk 20 11 2009Tran Van Tuan - Gnome Asia Talk 20 11 2009
Tran Van Tuan - Gnome Asia Talk 20 11 2009
 
Ray Wang - Gnome Accessibility And Automation Testing
Ray Wang - Gnome Accessibility And  Automation TestingRay Wang - Gnome Accessibility And  Automation Testing
Ray Wang - Gnome Accessibility And Automation Testing
 
Louis Suarez Potts - Community Matters Copu2009
Louis Suarez Potts - Community Matters Copu2009Louis Suarez Potts - Community Matters Copu2009
Louis Suarez Potts - Community Matters Copu2009
 
Frank Schellenberg - Ghp Far Ease Gnome Asia 2009
Frank Schellenberg - Ghp Far Ease  Gnome Asia 2009Frank Schellenberg - Ghp Far Ease  Gnome Asia 2009
Frank Schellenberg - Ghp Far Ease Gnome Asia 2009
 
Huu Le - Tma Open Source For Project Tools
Huu Le - Tma Open Source For Project ToolsHuu Le - Tma Open Source For Project Tools
Huu Le - Tma Open Source For Project Tools
 
Nguyen Vu Hung - Gnome Asia 2009 The Vision Of O Oo In Vietnam
Nguyen Vu Hung - Gnome Asia 2009 The Vision Of O Oo In VietnamNguyen Vu Hung - Gnome Asia 2009 The Vision Of O Oo In Vietnam
Nguyen Vu Hung - Gnome Asia 2009 The Vision Of O Oo In Vietnam
 
Fred Muller - Building Amips Netbook
Fred Muller - Building Amips NetbookFred Muller - Building Amips Netbook
Fred Muller - Building Amips Netbook
 
Mario Behling - Easier Faster Energy Saving
Mario Behling - Easier Faster Energy SavingMario Behling - Easier Faster Energy Saving
Mario Behling - Easier Faster Energy Saving
 
GNOME.Asia 2009 Vietnam
GNOME.Asia 2009 VietnamGNOME.Asia 2009 Vietnam
GNOME.Asia 2009 Vietnam
 
DebConf11 Berlin Proposal
DebConf11 Berlin ProposalDebConf11 Berlin Proposal
DebConf11 Berlin Proposal
 
Debconf 11 in Germany
Debconf 11 in GermanyDebconf 11 in Germany
Debconf 11 in Germany
 
LXDE Google Summer of Code 2009
LXDE Google Summer of Code 2009LXDE Google Summer of Code 2009
LXDE Google Summer of Code 2009
 
6mesh - IPv6 freifunk mesh networks
6mesh - IPv6 freifunk mesh networks6mesh - IPv6 freifunk mesh networks
6mesh - IPv6 freifunk mesh networks
 
LXDE Presentation at FOSDEM 2009
LXDE Presentation at FOSDEM 2009LXDE Presentation at FOSDEM 2009
LXDE Presentation at FOSDEM 2009
 
LXDE Icos2008 Presentation
LXDE Icos2008 PresentationLXDE Icos2008 Presentation
LXDE Icos2008 Presentation
 

Dernier

NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...Amil baba
 
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTGOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTharshitverma1762
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHenry Tapper
 
The AES Investment Code - the go-to counsel for the most well-informed, wise...
The AES Investment Code -  the go-to counsel for the most well-informed, wise...The AES Investment Code -  the go-to counsel for the most well-informed, wise...
The AES Investment Code - the go-to counsel for the most well-informed, wise...AES International
 
Market Morning Updates for 16th April 2024
Market Morning Updates for 16th April 2024Market Morning Updates for 16th April 2024
Market Morning Updates for 16th April 2024Devarsh Vakil
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economiccinemoviesu
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Sonam Pathan
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfshaunmashale756
 
project management information system lecture notes
project management information system lecture notesproject management information system lecture notes
project management information system lecture notesongomchris
 
The Inspirational Story of Julio Herrera Velutini - Global Finance Leader
The Inspirational Story of Julio Herrera Velutini - Global Finance LeaderThe Inspirational Story of Julio Herrera Velutini - Global Finance Leader
The Inspirational Story of Julio Herrera Velutini - Global Finance LeaderArianna Varetto
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfHenry Tapper
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppmiss dipika
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证rjrjkk
 
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...amilabibi1
 
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...Amil baba
 
212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technologyz xss
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasCherylouCamus
 
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一S SDS
 

Dernier (20)

NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
 
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTGOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview document
 
The AES Investment Code - the go-to counsel for the most well-informed, wise...
The AES Investment Code -  the go-to counsel for the most well-informed, wise...The AES Investment Code -  the go-to counsel for the most well-informed, wise...
The AES Investment Code - the go-to counsel for the most well-informed, wise...
 
Market Morning Updates for 16th April 2024
Market Morning Updates for 16th April 2024Market Morning Updates for 16th April 2024
Market Morning Updates for 16th April 2024
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economic
 
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdf
 
project management information system lecture notes
project management information system lecture notesproject management information system lecture notes
project management information system lecture notes
 
Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024
 
The Inspirational Story of Julio Herrera Velutini - Global Finance Leader
The Inspirational Story of Julio Herrera Velutini - Global Finance LeaderThe Inspirational Story of Julio Herrera Velutini - Global Finance Leader
The Inspirational Story of Julio Herrera Velutini - Global Finance Leader
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsApp
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
 
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
 
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
 
212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology
 
🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng Pilipinas
 
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
 

Wireless Hacking Talk

  • 1. Introduction Walking down the layers Into kernelspace That's it! Wireless Kernel Tweaking or how B.A.T.M.A.N. learned to y Marek Lindner, Simon Wunderlich December 28, 2007 Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 2. Introduction Walking down the layers Into kernelspace That's it! Outline 1 Introduction what is a (dynamic) routing protocol? the B.A.T.M.A.N. approach 2 Walking down the layers layer 3 vs. layer 2 implementation issues bridging 3 Into kernelspace what's dierent interacting with the kernel 4 That's it! Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 3. Introduction Walking down the layers what is a (dynamic) routing protocol? Into kernelspace the B.A.T.M.A.N. approach That's it! Example scenario - 6:00 Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 4. Introduction Walking down the layers what is a (dynamic) routing protocol? Into kernelspace the B.A.T.M.A.N. approach That's it! Example scenario - 23:00 Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 5. Introduction Walking down the layers what is a (dynamic) routing protocol? Into kernelspace the B.A.T.M.A.N. approach That's it! Example scenario (2) Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 6. Introduction Walking down the layers what is a (dynamic) routing protocol? Into kernelspace the B.A.T.M.A.N. approach That's it! Introduction to B.A.T.M.A.N. B.A.T.M.A.N. = better approach to mobile adhoc networks only decide next neighbour, not whole route topology is not used or known by nodes routing decisions are distributed by the nodes designed for lossy networks routing protocols internal is out of scope, we just assume it works ;) Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 7. Introduction layer 3 vs. layer 2 Walking down the layers implementation issues Into kernelspace bridging That's it! Layer 3 - isn't that enough? B.A.T.M.A.N. alters routing tables kernel manages routing of payload trac this works only for IP, no IPv6, DHCP, IPX ... users have to make sure that everyone has an unique IP routing into/outside other networks is quite complex Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 8. Introduction layer 3 vs. layer 2 Walking down the layers implementation issues Into kernelspace bridging That's it! Let's try layer 2 write userspace proof-of-concept, then go to kernelspace instead of IPs, use MAC-addresses as identiers (should be[TM] unique per design) we provide a virtual switch-port bat0 to the user virtual Ethernet interface (TAP), all other nodes are just one (virtual) hop away IP, IPv6, DHCP, IPX already works on Ethernet, we have nothing to do can be used as bridge over multiple interfaces (e.g. WiFi and Ethernet) Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 9. Introduction layer 3 vs. layer 2 Walking down the layers implementation issues Into kernelspace bridging That's it! Usage provide a virtual switch-port bat0 to the user k e r o :/# i f c o n f i g bat0 bat0 L i n k encap : E t h e r n e t HWaddr 0 0 : 1 3 : 3 7 : 9 1 : 4 2 : 3 7 i n e t 6 addr : f e 8 0 : : 2 1 7 : 1 3 f f : f e 3 7 :4237/64 Scope : L i n k UP BROADCAST RUNNING MULTICAST MTU: 1 4 7 2 M e t r i c : 1 RX p a c k e t s : 0 e r r o r s : 0 dropped : 0 o v e r r u n s : 0 frame : 0 TX p a c k e t s : 4 e r r o r s : 0 dropped : 0 o v e r r u n s : 0 c a r r i e r : 0 c o l l i s i o n s :0 txqueuelen :500 RX b y t e s : 0 ( 0 . 0 B) TX b y t e s : 3 2 8 ( 3 2 8 . 0 B) participants set IP adresses (etc.) on their bat0 interface k e r o :/# i f c o n f i g bat0 i n e t 1 9 2 . 1 6 8 . 1 0 . 2 3 k e r o :/# r o u t e add d e f a u l t gw 1 9 2 . 1 6 8 . 1 0 . 2 3 ( o r even b e t t e r : ) k e r o :/# d h c l i e n t bat0 Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 10. Introduction layer 3 vs. layer 2 Walking down the layers implementation issues Into kernelspace bridging That's it! All the layer 2 belong to us! B.A.T.M.A.N. transports the Ethernet-Frame to the node with the destination MAC it does not care about IP-adresses etc, just as your switch OGMs and payload are encapsulated in our own Ethernet-Frames (Ethertype 0x0842) Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 11. Introduction layer 3 vs. layer 2 Walking down the layers implementation issues Into kernelspace bridging That's it! Implementation TAP-interface bat0 receives/sends Ethernet-Frames from the user we decide which neighbour should receive it, based on the B.A.T.M.A.N. algorithm Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 12. Introduction layer 3 vs. layer 2 Walking down the layers implementation issues Into kernelspace bridging That's it! Bridging support B.A.T.M.A.N. collects MACs of participants behind the Bridge These lists are announced via HNA-Messages and ooded to all B.A.T.M.A.N. nodes With this, we have a decentralized MAC Translation Table Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 13. Introduction layer 3 vs. layer 2 Walking down the layers implementation issues Into kernelspace bridging That's it! Visualization Nice side eect: with the HNA information, the whole topology with the nodes behind the APs becomes visible Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 14. Introduction layer 3 vs. layer 2 Walking down the layers implementation issues Into kernelspace bridging That's it! Great - and now? proof-of-concept implementation in the userspace works quite well the problem is: performance! it should also run well on minimal embedded systems (Access Points, Cell Phones) typical path is: select(): wait for a packet read() it nd next hop, update tables etc. (pretty fast) write() it System Calls for read/write take very long time (switch to kernel mode and back, copy overhead) becomes a problem with high bandwidth usage, peak performance of the NICs can't be reached Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 15. Introduction Walking down the layers what's dierent Into kernelspace interacting with the kernel That's it! Put it into kernelspace No useless message copy (recycle kernel buers) no Syscalls and no user/kernel mode switch kernel works asynchronous and preemptive asynchronous packet handling possible Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 16. Introduction Walking down the layers what's dierent Into kernelspace interacting with the kernel That's it! Living in the kernelspace the proc lesystem # l s / p r o c / n e t /batman−adv / gateways interfaces log log_level originators orig_interval activating batman-adv # echo wlan0 / p r o c / n e t /batman−adv / i n t e r f a c e s deactivating batman-adv # echo quot;quot; / p r o c / n e t /batman−adv / i n t e r f a c e s Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 17. Introduction Walking down the layers what's dierent Into kernelspace interacting with the kernel That's it! Logging merits special attention the log level # c a t / p r o c / n e t /batman−adv / l o g _ l e v e l [ x ] c r i t i c a l (0) [ ] warnings (1) [ ] notices (2) [ ] batman ( 4 ) [ ] routes (8) setting the log level # echo 3 / p r o c / n e t /batman−adv / l o g _ l e v e l # c a t / p r o c / n e t /batman−adv / l o g _ l e v e l [ x ] c r i t i c a l (0) [ x ] warnings (1) [ x ] notices (2) [ ] batman ( 4 ) [ ] routes (8) reading the log # c a t / p r o c / n e t /batman−adv / l o g [ 6 2 6 ] B . A .T.M. A .N. Advanced 0.1− a l p h a ( c o m p a b i l i t y v e r s i o n 1) [ 9 7 1 ] Changing l o g _ l e v e l from : 0 to : 3 Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 18. Introduction Walking down the layers what's dierent Into kernelspace interacting with the kernel That's it! Kernel development don't be scared the kernel is a big library for all your hacking needs debugging techniques: clean programming - think before you insmod printk - tells you what's up kernel oops - gives you the stack trace UML - safer debugging again: don't panic! :-) Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 19. Introduction Walking down the layers what's dierent Into kernelspace interacting with the kernel That's it! Battool there is no ICMP on Layer 2 we still want to ping, traceroute etc to debug the network implement own ICMP protocol into batman-adv protocol battool provides ping, traceroute and raw packet dump injects and receives special packets into unix socket (userspace) or device (kernelspace) Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 20. Introduction Walking down the layers Into kernelspace That's it! Links http://open-mesh.net/ https://dev.open-mesh.net/batman Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 21. Introduction Walking down the layers Into kernelspace That's it! Thank you! Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking